Skip to main content
Course Enquiry
Contact Us

This course is currently not active. Feel free to submit an enquiry.

Details

Lead Computer Forensics Examiner training enables you to acquire the necessary expertise to perform Computer Forensics processes in order to obtain complete and reliable digital evidence. During this training course, you will also gain a thorough understanding of Computer Forensics fundamentals, based on the best practices used to perform forensics evidence recovery and analytical techniques. This training course is focused on core skills required to collect and analyze data from Windows, Mac OS X, and Linux operating systems, and also from mobile devices.

Lead Computer Forensics Examiner training enables you to acquire the necessary expertise to perform Computer Forensics processes in order to obtain complete and reliable digital evidence. During this training course, you will also gain a thorough understanding of Computer Forensics fundamentals, based on the best practices used to perform forensics evidence recovery and analytical techniques. This training course is focused on core skills required to collect and analyze data from Windows, Mac OS X, and Linux operating systems, and also from mobile devices.

After mastering all the necessary concepts of Computer Forensics processes, you can sit for the exam and apply for a "PECB Certified Lead Computer Forensics Examiner" credential. By holding a PECB Lead Computer Forensics Examiner Certificate, you will be able to prove that you have the expertise to lead advanced forensic investigations and conduct forensics analysis, reporting, and evidence acquisition. 

After mastering all the necessary concepts of Computer Forensics processes, you can sit for the exam and apply for a "PECB Certified Lead Computer Forensics Examiner" credential. By holding a PECB Lead Computer Forensics Examiner Certificate, you will be able to prove that you have the expertise to lead advanced forensic investigations and conduct forensics analysis, reporting, and evidence acquisition. 

  • Understand the roles and responsibilities of the Lead Computer Forensics examiner during digital forensic investigation 
  • Understand the purpose of electronic media examination and its correlation with common standards and methodologies 
  • Comprehend the correct sequence of steps of a computer incident investigation and digital forensic operation 
  • Understand the common commercial and open source tools that may be used during incident investigation and digital forensic operations 
  • Acquire the necessary competencies to plan and execute a computer forensics operation and also implement and maintain a safety network to protect evidence
  • Understand the roles and responsibilities of the Lead Computer Forensics examiner during digital forensic investigation 
  • Understand the roles and responsibilities of the Lead Computer Forensics examiner during digital forensic investigation 
  • Understand the purpose of electronic media examination and its correlation with common standards and methodologies 
  • Understand the purpose of electronic media examination and its correlation with common standards and methodologies 
  • Comprehend the correct sequence of steps of a computer incident investigation and digital forensic operation 
  • Comprehend the correct sequence of steps of a computer incident investigation and digital forensic operation 
  • Understand the common commercial and open source tools that may be used during incident investigation and digital forensic operations 
  • Understand the common commercial and open source tools that may be used during incident investigation and digital forensic operations 
  • Acquire the necessary competencies to plan and execute a computer forensics operation and also implement and maintain a safety network to protect evidence
  • Acquire the necessary competencies to plan and execute a computer forensics operation and also implement and maintain a safety network to protect evidence

    Duration:

    5 Days

    Delivery Method

    Instructor Led classroom based training. Scheduled classes are normally held in Woodmead - near to Sandton in Johannesburg, Gauteng, South Africa. Stationary and textbook included. Refreshments, including 2 tea breaks and a cooked meal for lunch are provided for full time courses. Contact hours are between 9am to 4pm.

    Audience

    • Computer Forensics specialists
    • Computer Forensics consultants
    • Cybersecurity professionals
    • Cyber intelligence analysts
    • Electronic data analysts
    • Specialists in computer evidence recovery
    • Professionals working or interested in law enforcement
    • Professionals seeking to advance their knowledge in Computer Forensics analysis
    • Information Security team members
    • Information technology expert advisors
    • Individuals responsible for examining media to extract and disclose data
    • IT Specialists
  • Pre-Requisites

    Knowledge on Computer Forensics. 

    Knowledge on Computer Forensics.  end tab-content
  • Course Outline / Curriculum

    Day 1: Introduction to Incident Response and Computer Forensics concepts

    Day 2: Prepare and lead a Computer Forensics investigation

    Day 3: Analysis and management of digital artifacts

    Day 4: Case Presentation & Trial Simulation 

    Day 5: Certification Exam

     

    Day 1: Introduction to Incident Response and Computer Forensics concepts

    Day 1:Day 1: Introduction to Incident Response and Computer Forensics concepts

    Day 2: Prepare and lead a Computer Forensics investigation

    Day 2:Day 2: Prepare and lead a Computer Forensics investigation

    Day 3: Analysis and management of digital artifacts

    Day 3:Day 3: Analysis and management of digital artifacts

    Day 4: Case Presentation & Trial Simulation 

    Day 4: Day 4: Case Presentation & Trial Simulation 

    Day 5: Certification Exam

    Day 5:Day 5: Certification Exam
     
      end tab-content